FWIW, if I may offer opinion: I would agree with Alex with the need to source out better unofficial databases (such as sanesecurity, securiteinfo etc): clam definitions are inherently slow on the uptake of new threats, taking a day or more (at best) and in some cases never (ive demonstrated this in other posts on this mail list). (I dont know if I am breaking a rule here by advertising - apologies if so but I am not affiliated in any way) sanesecurity definitions have proven invaluable and EXTREMELY responsive regarding zero-hour threats especially to the crytolocker and DOC-macro based threats (REALLY being 'zero hour' coverage by definition). (In my opinion. I also believe that they the ONLY way you can use ClamAv is if you employ 3rd party definitions given that most threats are at its highest danger level just hours after release and its simply unproductive releasing signatures to catch them days later (or never!). Clam always needs supplementing with either 3rd party definitions (which Alex has), another realtime scanning commercial Av product (which Alex has), or both (which Alex has).

I can bery well imagine, though that 9 million definitions are excessive and probably over 70% have no point in existing any more (threat probably been and gone).

Alex, I use standard defs and sane only (to cut down on definitions) and have excellent coverage without the slow 'startup times' that you have mentioned whilst being backed up with Bitdefender on the client PC's. Might be worth changing your signatures if they are increasing your start time without adding any noticeable benefit (or at least experiemnting to see if it makes a difference. You can always revert back to your current choice....and your " ' ' response " error. ;-)

Jim

On 22/02/2016 15:08, Alex wrote:
Hi,

Can’t be of much help with your primary issue, but to answer one or your 
questions, the official ClamAV database is a bit over 4 million.  I can’t 
conceive of a situation where you would need every conceivable unofficial 
database, but then I have no idea what you are doing with your setup, other 
than it would appear to have some relationship to e-mail service.
It comes from complaints from users about zero-day and cryptowall
viruses making it through the mail gateway, then being caught by
Symantec as it reaches Exchange. Or a compromise being traced back to
not having caught a virus a few hours earlier.

There was a discussion less than a month ago concerning minimum essential 
database subscriptions, so
suggest you search around in the archive for that thread
<clamav-user archives>.
I'll search around, thanks.

Assistance with my other issues would still very much be appreciated.

Thanks,
Alex

-Al-

On Sun, Feb 21, 2016 at 03:40 PM, Alex wrote:
Hi,

I have a clamav-0.99-2 installation on fedora23 and periodically I
receive a message when running clamav-notify-servers after having run
freshclam that reports:

# clamav-notify-servers
clamd server '/var/run/clamd.amavisd/clamd.sock' gave '' response

I have a script that periodically rsyncs the malwarepatrol db to the
/var/lib/clamav directory then runs the clamav-notify-servers. I
believe the problem is related to this occurring at the same time as
the regular freshclam-sleep script running clamav-notify-servers.

Is this the intended behavior for clamd?

I have about 9M signatures now, so it appears to take a long time to
reload the database every time the clamav-notify-servers signal is
sent.

Can someone provide some advice on the best way to do this? I don't
think I can control the timing of the clamav-notify-servers to make
sure it doesn't happen while another instance occurs. Should I just
redirect the output to /dev/null?

Is it common to have 9M entries?

It looks to take about 30s to reload the database:
Feb 21 03:22:15 mail03 clamd[1006]: Reading databases from /var/lib/clamav
Feb 21 03:22:46 mail03 clamd[1006]: Database correctly reloaded
(8888331 signatures)
Feb 21 03:22:46 mail03 clamd[1006]: Client disconnected (FD 23)

This is on a six-core 3Ghz system on SSD disks.

[root@mail03 clamav]# ls
badmacro.ndb                 foxhole_filename.cdb  phishtank.ndb
   spamattach.hdb
blurl.ndb                    foxhole_generic.cdb   porcupine.hsb
   spamimg.hdb
bofhland_cracked_URL.ndb     hackingteam.hsb       porcupine.ndb
   spam.ldb
bofhland_malware_attach.hdb  javascript.ndb        rogue.hdb
   spearl.ndb
bofhland_malware_URL.ndb     junk.ndb              safebrowsing.cvd
   spear.ndb
bofhland_phishing_URL.ndb    jurlbla.ndb           sanesecurity.ftm
   winnow.attachments.hdb
my_sigwhitelist.gdb         jurlbl.ndb            scamnailer.ndb
  winnow_bad_cw.hdb
my_sigwhitelist.ign2        lott.ndb              scam.ndb
  winnow.complex.patterns.ldb
my_sigwhitelist.wdb         main.cvd
securiteinfoascii.hdb  winnow_extended_malware.hdb
bytecode.cld                 malwarehash.hsb       securiteinfo.hdb
   winnow_malware.hdb
crdfam.clamav.hdb            malwarepatrol.ndb
securiteinfohtml.hdb   winnow_malware_links.ndb
create_sig.txt               mirrors.dat           securiteinfo.ign2
   winnow_phish_complete_url.ndb
daily.cld                    phish.ndb             sigwhitelist.ign2
   winnow_spam_complete.ndb

I think the commercial securiteinfo databases are entirely too large
and don't perform very well.

Of course I could cut down on the databases, but I'm more interested
in finding out why clamd produces the error message when multiple
signals are sent.

Thanks,
Alex

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to